6 Most important Identity Management (IAM) Trends at EIC 2019
iWelcome Blog
by Esther Westra
1y ago
A few weeks ago, I visited KuppingerCole’s European Identity and Cloud Conference, the leading Identity conference in Europe with 1.000 (!) attendees. The wide variety of the program and the conversations I had were clear about one thing: Identity Management is more and more about enabling business rather than supporting internal IT, and therefore also more and more fun. These are the most important trends that I spotted ..read more
Visit website
The importance of a secure password and how to create one
iWelcome Blog
by Andrei Sfat
1y ago
In a series of two blog posts, Andrei Sfat (Developer at iWelcome) shares his thoughts and some useful tips and tricks on the use of online passwords. *Updated September 2020  ..read more
Visit website
Top 4 guiding principles for integrating cloud CIAM solutions
iWelcome Blog
by Arie Timmerman
1y ago
In this blog, Arie Timmerman, Technical Consultant at iWelcome, shares four key topics to take into consideration when implementing cloud versus on-premise Consumer Identity and Access Management (CIAM) solutions ..read more
Visit website
GDPR and IoT: Technology ahead of legislation
iWelcome Blog
by Esther Westra
1y ago
I’m a big fan of Scandinavian TV shows. The Swedish sci-fi drama ‘Real Humans’ is one of my favourites. It was released a few years ago and it’s based on a near future world, where human robots (hubots) have become an everyday phenomenon. In a world where technology is so advanced, the boundaries between human and machine become blurry. New questions arise - should these human robots be paid for the work they do? Who is responsible for their actions in case things go wrong? Should hubots get a legal status of their own, and legal rights to go with that ..read more
Visit website
Privacy by design: Data protection starts in the whiteboard phase – Part 6 of 9
iWelcome Blog
by Corné van Rooij
1y ago
This is the sixth in a series of nine blog posts on how Consumer Identity and Access Management (CIAM) products can help organisations in their Compliance with the General Data Protection Regulation (GDPR). This blog is part of a series that touches on important topics for CIAM experts who have an interest in the new EU regulation. This week’s topic is about ‘privacy by design’ – resulting in default protection of personal data ..read more
Visit website
Meltdown and Spectre - a security perspective
iWelcome Blog
by Derk Tegeler
1y ago
In this blog, Derk Tegeler (Security Officer at iWelcome) shares his thoughts and possible mitigation measures for two major vulnerabilities that hit the news earlier this month: Meltdown and Spectre. Just a heads-up: this article contains technical security information ..read more
Visit website
Children's privacy under GDPR - Part 9 of 9
iWelcome Blog
by Corné van Rooij
1y ago
This is the ninth in a series of nine blog posts on how Consumer Identity and Access Management (CIAM) products can help organisations in their Compliance with the General Data Protection Regulation (GDPR). This blog is part of a series that cover important topics for CIAM experts who have an interest in the new EU regulation. The topic is 'Children's privacy under GDPR ..read more
Visit website
The lessons of the two-sided market for Self-Sovereign Identity and 3rd party Identity providers
iWelcome Blog
by Maarten Stultjens
2y ago
Being an economist, I look at the developments of the usage of 3rd party digital identities as a two-sided market or two-sided network. In a two-sided market there are two distinct user groups. Members of one group exhibit a preference regarding a high number of users in the other group - this is referred to as cross-side network effects ..read more
Visit website
Top 3 Trends in Consumer Identity and Access Management (CIAM)
iWelcome Blog
by Wouter de Wit
2y ago
Digital native generations are reaching an age at which most have an income and start to become a powerful consumer. That makes them thé target audience for a large number of organisations all competing for the cash and business of these generation's individuals ..read more
Visit website
IDaaS & MFA: how they protect Cloud Identities together
iWelcome Blog
by Elena Leu
2y ago
Identity & Access Management policies date back to the pre-digital era, when physical information used to be guarded by perimeter protocols and restrictions. These ensured that assets would only be accessed, viewed and handled after passing all restrictions, usually in the form of guards, restricted areas, badges or copy limitations ..read more
Visit website

Follow iWelcome Blog on FeedSpot

Continue with Google
Continue with Apple
OR